Bug 632657 - (CVE-2010-3083) CVE-2010-3083 MRG: SSL connections to MRG broker can be blocked
CVE-2010-3083 MRG: SSL connections to MRG broker can be blocked
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20101007,reported=20100517,sou...
: Security
Depends On: 593099 601239
Blocks:
  Show dependency treegraph
 
Reported: 2010-09-10 12:42 EDT by Vincent Danen
Modified: 2010-10-12 11:49 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-10-12 11:49:34 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2010-09-10 12:42:22 EDT
It was discovered that SSL connections to the MRG broker could easily be blocked.  If a client or application initiated a connection to the MRG broker's listening SSL port, the client connection would block access to the port until the SSL handshake completes (or fails).  If a client failed to proceed with it, then the thread was never freed to process other connections, denying service to other clients.  Only SSL connections were affected by this issue, and SSL support is not enabled by default.
Comment 2 Vincent Danen 2010-09-14 13:24:38 EDT
The fix for this issue was public a year and a half ago, but I do not know if the security implications were every really known:

http://svn.apache.org/viewvc/qpid/trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp?r1=790291&r2=790290&pathrev=790291&view=patch

However, the second half of the above patch was reverted later:

http://svn.apache.org/viewvc/qpid/trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp?r1=919487&r2=938992

with the following commit message:

QPID-2083: Some improvements to error handling for NSS based SSL implementation.

https://issues.apache.org/jira/browse/QPID-2083

Looking at the RHEL6 and Fedora sources, the initial patch has been applied, and in RHEL6 at least the second hunk has been reverted, as with upstream (but not in Fedora).
Comment 5 errata-xmlrpc 2010-10-07 21:49:52 EDT
This issue has been addressed in following products:

  MRG for RHEL-5

Via RHSA-2010:0756 https://rhn.redhat.com/errata/RHSA-2010-0756.html
Comment 6 errata-xmlrpc 2010-10-07 21:56:00 EDT
This issue has been addressed in following products:

  Messaging for MRG on RHEL-4
  Messaging Base for MRG on RHEL-4

Via RHSA-2010:0757 https://rhn.redhat.com/errata/RHSA-2010-0757.html

Note You need to log in before you can comment on or make changes to this bug.